安全攻防工程师
Bybit
Job Responsibilities
Red-Blue Team Exercises
Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.
Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.
Attack Surface Analysis
Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.
Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.
Tools and Technology Development
Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.
Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.
Security Assessment and Reporting
Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.
Assist in improving the organization’s security mechanisms and promote the optimization of security systems.
Cross-Department Collaboration
Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.
Provide security support to other departments, including incident response drills and development security consultation.
Job Requirements
Fundamental Skills
Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.
Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).
Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.
Technical Proficiency
Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.
Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).
Experience Requirements
At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.
Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.
Additional Skills
Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.
Strong documentation skills with the ability to produce high-quality technical reports.
High sense of responsibility, strong team collaboration, and ability to work under pressure.
Bonus Points
Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.
Hands-on experience with zero-trust architectures or security operations projects.
A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.
Job Responsibilities
Red-Blue Team Exercises
Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.
Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.
Attack Surface Analysis
Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.
Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.
Tools and Technology Development
Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.
Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.
Security Assessment and Reporting
Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.
Assist in improving the organization’s security mechanisms and promote the optimization of security systems.
Cross-Department Collaboration
Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.
Provide security support to other departments, including incident response drills and development security consultation.
Job Requirements
Fundamental Skills
Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.
Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).
Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.
Technical Proficiency
Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.
Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).
Experience Requirements
At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.
Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.
Additional Skills
Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.
Strong documentation skills with the ability to produce high-quality technical reports.
High sense of responsibility, strong team collaboration, and ability to work under pressure.
Bonus Points
Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.
Hands-on experience with zero-trust architectures or security operations projects.
A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.